Journal articles on the topic 'Personally-Identifiable information protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Personally-Identifiable information protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Liu, Deliang. "The Protection of Personally Identifiable Information." SCRIPT-ed 4, no. 4 (December 15, 2007): 389–406. http://dx.doi.org/10.2966/scrip.040407.389.
Fugkeaw, Somchart, and Pattavee Sanchol. "Enabling Efficient Personally Identifiable Information Detection with Automatic Consent Discovery." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 17, no. 2 (June 8, 2023): 245–54. http://dx.doi.org/10.37936/ecti-cit.2023172.252270.
Onik, Md Mehedi Hassan, Chul-Soo Kim, Nam-Yong Lee, and Jinhong Yang. "Privacy-aware blockchain for personal data sharing and tracking." Open Computer Science 9, no. 1 (April 15, 2019): 80–91. http://dx.doi.org/10.1515/comp-2019-0005.
Posey, Clay, Uzma Raja, Robert E. Crossler, and A. J. Burns. "Taking stock of organisations’ protection of privacy: categorising and assessing threats to personally identifiable information in the USA." European Journal of Information Systems 26, no. 6 (November 2017): 585–604. http://dx.doi.org/10.1057/s41303-017-0065-y.
Bomba, David, and George Hallit. "Will the new Australian Health Privacy Law provide adequate protection?" Australian Health Review 25, no. 3 (2002): 141. http://dx.doi.org/10.1071/ah020141a.
Mavridis, Ioannis. "Deploying Privacy Improved RBAC in Web Information Systems." International Journal of Information Technologies and Systems Approach 4, no. 2 (July 2011): 70–87. http://dx.doi.org/10.4018/jitsa.2011070105.
Ellis, Donna A. "A case history in architectural acoustics: Security, acoustics, the protection of personally identifiable information (PII), and accessibility for the disabled." Journal of the Acoustical Society of America 136, no. 4 (October 2014): 2182. http://dx.doi.org/10.1121/1.4899907.
Cruz, Bruno Silveira, and Murillo de Oliveira Dias. "Does digital privacy really exist? When the consumer is the product." Asian Journal of Economics and Business Management 1, no. 1 (June 28, 2022): 39–43. http://dx.doi.org/10.53402/ajebm.v1i1.53.
Olabanji, Samuel Oladiipo, Oluseun Babatunde Oladoyinbo, Christopher Uzoma Asonze, Tunbosun Oyewale Oladoyinbo, Samson Abidemi Ajayi, and Oluwaseun Oladeji Olaniyi. "Effect of Adopting AI to Explore Big Data on Personally Identifiable Information (PII) for Financial and Economic Data Transformation." Asian Journal of Economics, Business and Accounting 24, no. 4 (February 26, 2024): 106–25. http://dx.doi.org/10.9734/ajeba/2024/v24i41268.
Georgiadou, Yola, Rolf de By, and Ourania Kounadi. "Location Privacy in the Wake of the GDPR." ISPRS International Journal of Geo-Information 8, no. 3 (March 22, 2019): 157. http://dx.doi.org/10.3390/ijgi8030157.
Ukwueze, Festus. "Strengthening the Legal Framework for Personal Data Protection in Nigeria." Nigerian Juridical Review 16 (June 28, 2022): 124–42. http://dx.doi.org/10.56284/tnjr.v16i1.16.
Villarán, Carlos, and Marta Beltrán. "User-Centric Privacy for Identity Federations Based on a Recommendation System." Electronics 11, no. 8 (April 14, 2022): 1238. http://dx.doi.org/10.3390/electronics11081238.
Mićović, Marko, Uroš Radenković, and Pavle Vuletić. "Network Layer Privacy Protection Using Format-Preserving Encryption." Electronics 12, no. 23 (November 27, 2023): 4800. http://dx.doi.org/10.3390/electronics12234800.
Koo, Jahoon, Giluk Kang, and Young-Gab Kim. "Security and Privacy in Big Data Life Cycle: A Survey and Open Challenges." Sustainability 12, no. 24 (December 17, 2020): 10571. http://dx.doi.org/10.3390/su122410571.
Fiaz, Faisal, Syed Muhammad Sajjad, Zafar Iqbal, Muhammad Yousaf, and Zia Muhammad. "MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms." Future Internet 16, no. 5 (May 18, 2024): 176. http://dx.doi.org/10.3390/fi16050176.
Oluwatoyin Ajoke Fayayola, Oluwabukunmi Latifat Olorunfemi, and Philip Olaseni Shoetan. "DATA PRIVACY AND SECURITY IN IT: A REVIEW OF TECHNIQUES AND CHALLENGES." Computer Science & IT Research Journal 5, no. 3 (March 18, 2024): 606–15. http://dx.doi.org/10.51594/csitrj.v5i3.909.
Kelly, Miriam, Eoghan Furey, and Kevin Curran. "How to Achieve Compliance with GDPR Article 17 in a Hybrid Cloud Environment." Sci 2, no. 2 (April 2, 2020): 22. http://dx.doi.org/10.3390/sci2020022.
Kelly, Miriam, Eoghan Furey, and Kevin Curran. "How to Achieve Compliance with GDPR Article 17 in a Hybrid Cloud Environment." Sci 3, no. 1 (January 4, 2021): 3. http://dx.doi.org/10.3390/sci3010003.
Reyes, Irwin, Primal Wijesekera, Joel Reardon, Amit Elazari Bar On, Abbas Razaghpanah, Narseo Vallina-Rodriguez, and Serge Egelman. "“Won’t Somebody Think of the Children?” Examining COPPA Compliance at Scale." Proceedings on Privacy Enhancing Technologies 2018, no. 3 (June 1, 2018): 63–83. http://dx.doi.org/10.1515/popets-2018-0021.
Sun, Yuanyi, Sencun Zhu, and Yu Chen. "ZoomP3: Privacy-Preserving Publishing of Online Video Conference Recordings." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (July 2022): 630–49. http://dx.doi.org/10.56553/popets-2022-0089.
Shakor, Ali M. "When Wireless Technologies Faces COVID-19: via Apps using to Combat the Pandemic and Save the Economy." Tikrit Journal of Engineering Sciences 29, no. 2 (July 27, 2022): 41–50. http://dx.doi.org/10.25130/tjes.29.2.6.
Yamcharoen, P., O. S. Folorunsho, A. Bayewu, and T. P. Ojo. "Impact of Digitalizing Healthcare Business Operations on Cybersecurity Landscape." Advances in Multidisciplinary and scientific Research Journal Publication 8, no. 4 (December 30, 2022): 27–34. http://dx.doi.org/10.22624/aims/bhi/v8n4p3.
Kollnig, Konrad, Anastasia Shuba, Reuben Binns, Max Van Kleek, and Nigel Shadbolt. "Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps." Proceedings on Privacy Enhancing Technologies 2022, no. 2 (March 3, 2022): 6–24. http://dx.doi.org/10.2478/popets-2022-0033.
Kuang, Lida, Samruda Pobbathi, Yuri Mansury, Matthew A. Shapiro, and Vijay K. Gurbani. "Predicting age and gender from network telemetry: Implications for privacy and impact on policy." PLOS ONE 17, no. 7 (July 21, 2022): e0271714. http://dx.doi.org/10.1371/journal.pone.0271714.
Gonzalez-Granadillo, Gustavo, Sofia Anna Menesidou, Dimitrios Papamartzivanos, Ramon Romeu, Diana Navarro-Llobet, Caxton Okoh, Sokratis Nifakos, Christos Xenakis, and Emmanouil Panaousis. "Automated Cyber and Privacy Risk Management Toolkit." Sensors 21, no. 16 (August 15, 2021): 5493. http://dx.doi.org/10.3390/s21165493.
Makhija, Anil K. "Deep Learning Application – Identifying PII (Personally Identifiable Information) to Protect." Journal of Accounting, Finance, Economics, and Social Sciences 5, no. 2 (2020): 10–16. http://dx.doi.org/10.62458/jafess.160224.5(2)10-16.
Bader, Michael D. M., Stephen J. Mooney, and Andrew G. Rundle. "Protecting Personally Identifiable Information When Using Online Geographic Tools for Public Health Research." American Journal of Public Health 106, no. 2 (February 2016): 206–8. http://dx.doi.org/10.2105/ajph.2015.302951.
Hofman, Darra, Victoria Louise Lemieux, Alysha Joo, and Danielle Alves Batista. "“The margin between the edge of the world and infinite possibility”." Records Management Journal 29, no. 1/2 (March 11, 2019): 240–57. http://dx.doi.org/10.1108/rmj-12-2018-0045.
Shin, Yong-Nyuo. "Standard Implementation for Privacy Framework and Privacy Reference Architecture for Protecting Personally Identifiable Information." International Journal of Fuzzy Logic and Intelligent Systems 11, no. 3 (September 30, 2011): 197–203. http://dx.doi.org/10.5391/ijfis.2011.11.3.197.
Houser, Ryan. "Private Health Information Legal Protections in Emergency Medical Services." International Journal of Paramedicine, no. 1 (November 16, 2022): 29–37. http://dx.doi.org/10.56068/jtng9057.
Sodiya, Adesina S., and Adegbuyi B. "A Framework for Protecting Users' Privacy in Cloud." International Journal of Information Security and Privacy 10, no. 4 (October 2016): 33–43. http://dx.doi.org/10.4018/ijisp.2016100102.
Bergren, Martha Dewey. "HIPAA-FERPA REVISITED." Journal of School Nursing 20, no. 2 (April 2004): 107–12. http://dx.doi.org/10.1177/10598405040200020901.
Baker, Christina, Cynthia A. Galemore, and Kerri McGowan Lowrey. "Information Sharing in the School Setting During a Public Health Emergency." NASN School Nurse 35, no. 4 (May 15, 2020): 198–202. http://dx.doi.org/10.1177/1942602x20925031.
Bergren, Martha Dewey, and Kathleen Johnson. "Data Sharing." NASN School Nurse 34, no. 4 (July 2019): 211–13. http://dx.doi.org/10.1177/1942602x19852934.
Rashid, Husain, Khan Rabia, Tyagi Rajesh, and Kumar Komakula Manoj. "Enhancing cyber security in health care industry by using ISO 27001 accreditation." i-manager's Journal on Digital Forensics & Cyber Security 1, no. 2 (2023): 26. http://dx.doi.org/10.26634/jdf.1.2.20020.
Nallamolu, Sathish, and Srinivas Padmanabhuni. "A Privacy Preserving Generative Adversarial Network for Image Data." ITM Web of Conferences 53 (2023): 03004. http://dx.doi.org/10.1051/itmconf/20235303004.
Jayasuriya, D. Dulani, and Alexandra Sims. "From the abacus to enterprise resource planning: is blockchain the next big accounting tool?" Accounting, Auditing & Accountability Journal 36, no. 1 (May 6, 2022): 24–62. http://dx.doi.org/10.1108/aaaj-08-2020-4718.
Mohammadzadeh , Nasibeh, Sadegh Dorri Nogoorani, and José Luis Muñoz-Tapia . "Decentralized Factoring for Self-Sovereign Identities." Electronics 10, no. 12 (June 18, 2021): 1467. http://dx.doi.org/10.3390/electronics10121467.
Elder, Jonathan, Nicole Jacobson, Natalie Remsen, and Kim Wilmath. "Behind Enemy Lines." Journal of Information Technology Education: Discussion Cases 6 (2017): 12. http://dx.doi.org/10.28945/3928.
Герасимов, А. А., А. В. Мозговой, К. А. Пугачев, and В. А. Кузнецов. "Choosing of data protection facilities in the information systems of personally identifiable information." Engineering Journal: Science and Innovation, no. 24 (November 2013). http://dx.doi.org/10.18698/2308-6033-2013-11-1016.
Kumekawa, Joanne. "Health Information Privacy Protection: Crisis or Common Sense?" OJIN: The Online Journal of Issues in Nursing 6, no. 3 (September 30, 2001). http://dx.doi.org/10.3912/ojin.vol6no03man02.
Pfaff, Emily R., Melissa A. Haendel, Kristin Kostka, Adam Lee, Emily Niehaus, Matvey B. Palchuk, Kellie Walters, and Christopher G. Chute. "Ensuring a safe(r) harbor: Excising personally identifiable information from structured electronic health record data." Journal of Clinical and Translational Science 6, no. 1 (December 9, 2021). http://dx.doi.org/10.1017/cts.2021.880.
Choi, Min-Wook. "The Use and Protection of Personally Non- Identifiable Information in Digital Behavioral Advertising in the Age of Big Data." Indian Journal of Science and Technology 9, no. 44 (November 30, 2016). http://dx.doi.org/10.17485/ijst/2016/v9i44/105097.
Karabasttk, Onur mname. "The Role of Data Protection and Privacy Law in Personally Identifiable Information Driven Mergers from the EU Merger Perspective." SSRN Electronic Journal, 2017. http://dx.doi.org/10.2139/ssrn.3097125.
M P, Haripriya. "Cyber Security Unveiled: Trends and Protections in the Digital World." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 07 (July 15, 2023). http://dx.doi.org/10.55041/ijsrem24720.
ANIL KUMAR et al. "AN ANALYSIS OF THE LAWS CONCERNING DIGITAL PRIVACY." Russian Law Journal 11, no. 4s (April 5, 2023). http://dx.doi.org/10.52783/rlj.v11i4s.834.
"Network Safety On Blockchain-Based Applications Across Multiple Domains." International Journal For Innovative Engineering and Management Research, December 27, 2020, 619–23. http://dx.doi.org/10.48047/ijiemr/v09/i12/104.
M, Rekha, and Shoba Rani P. "Determining Intrusion Attacks Against Online Applications Using Cloud-Based Data Security." ICST Transactions on Scalable Information Systems, February 5, 2024. http://dx.doi.org/10.4108/eetsis.5028.
Herath, Suvineetha, Haywood Gelman, and Lisa McKee. "Privacy Harm and Non-Compliance from a Legal Perspective." Journal of Cybersecurity Education Research and Practice 2023, no. 2 (October 12, 2023). http://dx.doi.org/10.32727/8.2023.18.
De Araujo Almeida, Bethania, Denise Moraes Pimenta, and Mauricio Barreto. "Perceptions and experiences on data sharing and linkage for research and the evaluation of public health policy." International Journal of Population Data Science 7, no. 3 (August 25, 2022). http://dx.doi.org/10.23889/ijpds.v7i3.2013.